overview
play

Overview Introduction Background Target Application Vulnerability - PowerPoint PPT Presentation

niversiteit van Amsterdam System and Network Engineering E ffectiveness of A utomated A pplication P enetration T esting T ools A LEXANDRE F ERREIRA H ARALD K LEPPE Overview Introduction Background Target Application Vulnerability


  1. niversiteit van Amsterdam System and Network Engineering E ffectiveness of A utomated A pplication P enetration T esting T ools A LEXANDRE F ERREIRA H ARALD K LEPPE

  2. Overview ● Introduction ● Background ● Target Application ● Vulnerability Scanners ● Test Results ● Conclusion ● Questions

  3. Introduction ● Are automated penetration testing tools effective? – What and how is automated with these tools? – How much manual intervention is required from the results? (false positives / negatives) – What are the most effective tools? – What level of effectiveness is acceptable / necessary to properly support pentesters?

  4. Background ● OWASP Top 10 Project ● What is a Penetration Test? ● What is a Penetration Testing Tool?

  5. Target Application ● Why a new application? – Other tools (HacmeBank, WebGoat, ...) – Known implementations ● How and which vulnerabilities are implemented? – Lets have a look!

  6. Target Application (2) ● SQL Injection – In URL and in HTML form ● Cross Site Scripting (XSS) – Stored and relected ● Cross Site Request Forgery (CSRF) ● Path traversal ● Failure to restrict URL access ● Printed error

  7. Vulnerability Scanners ● Tool selection – Both open source and commercial tools – Established tools – New players – Some tools: €10 000 per year

  8. Vulnerability Scanners (2) Commercial Open Source ● Acunetix ● Paros ● BurpSuite Pro ● Skipfish ● Core Impact ● w3af ● IBM AppScan ● ZAProxy ● NTOSpider ● ParosPro ● Qualys

  9. Vulnerability Scanners (3)

  10. Vulnerability Scanners (4)

  11. Test Results ● Low hitrate, differ from other research ● None of the tools “passed” this test

  12. Test Results (2) Vulnerability Failure to SQL SQL Printed Type Path Reflected Stored restrict Injection CSRF Injection error traversal XSS XSS URL (in HTML (in URL) message Tools access form) Commercial Commercial Commercial Commercial Commercial Commercial Open Source Commercial Commercial Open Source Open Source Open Source

  13. Test Results (3) ● Insufficient dataset to compare the tools generally ● Relying on crawling engines proves to be dangerous

  14. Conclusion ● Scanners are conditionally effective ● Nearly the entire scan can be automated ● Quite some intervention is required ● For our application: Skipfish + BurpSuite ● Necessary effectiveness

  15. Conclusion (2) ● Further research – Crawling abilities of different scanners – Selective scanning

  16. Questions n e ? g a r V Perguntas Въпроси Pytania Spørsmål ς ι ε σ F ή r τ a ω g e ρ n Ε

Download Presentation
Download Policy: The content available on the website is offered to you 'AS IS' for your personal information and use only. It cannot be commercialized, licensed, or distributed on other websites without prior consent from the author. To download a presentation, simply click this link. If you encounter any difficulties during the download process, it's possible that the publisher has removed the file from their server.

Recommend


More recommend